271 research outputs found
Novel Proposed Work for Empirical Word Searching in Cloud Environment
People's lives have become much more convenient as a result of the development of cloud storage. The third-party server has received a lot of data from many people and businesses for storage. Therefore, it is necessary to ensure that the user's data is protected from prying eyes. In the cloud environment, searchable encryption technology is used to protect user information when retrieving data. The versatility of the scheme is, however, constrained by the fact that the majority of them only offer single-keyword searches and do not permit file changes.A novel empirical multi-keyword search in the cloud environment technique is offered as a solution to these issues. Additionally, it prevents the involvement of a third party in the transaction between data holder and user and guarantees integrity. Our system achieves authenticity at the data storage stage by numbering the files, verifying that the user receives a complete ciphertext. Our technique outperforms previous analogous schemes in terms of security and performance and is resistant to inside keyword guessing attacks.The server cannot detect if the same set of keywords is being looked for by several queries because our system generates randomized search queries. Both the number of keywords in a search query and the number of keywords in an encrypted document can be hidden. Our searchable encryption method is effective and protected from the adaptive chosen keywords threat at the same time
PHOABE : securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT
Attribute based encryption (ABE) is an encrypted access control mechanism that ensures efficient data sharing among dynamic group of users. Nevertheless, this encryption technique presents two main drawbacks, namely high decryption cost and publicly shared access policies, thus leading to possible usersâ privacy leakage.
In this paper, we introduce PHOABE, a Policy-Hidden Outsourced ABE scheme. Our construction presents several advantages. First, it is a multi-attribute authority ABE scheme. Second, the expensive computations for the ABE decryption process is partially delegated to a Semi Trusted Cloud Server. Third, usersâ privacy is protected thanks to a hidden access policy. Fourth, PHOABE is proven to be selectively secure, verifiable and policy privacy preserving under the random oracle model. Five, estimation of the processing overhead proves its feasibility in IoT constrained environments
CUPS : Secure Opportunistic Cloud of Things Framework based on Attribute Based Encryption Scheme Supporting Access Policy Update
The everâgrowing number of internet connected devices, coupled with the new computing trends, namely within emerging opportunistic networks, engenders several security concerns. Most of the exchanged data between the internet of things (IoT) devices are not adequately secured due to resource constraints on IoT devices. Attributeâbased encryption is a promising cryptographic mechanism suitable for distributed environments, providing flexible access control to encrypted data contents. However, it imposes high decryption costs, and does not support access policy update, for highly dynamic environments. This paper presents CUPS, an ABEâbased framework for opportunistic cloud of things applications, that securely outsources data decryption process to edge nodes in order to reduce the computation overhead on the user side. CUPS allows endâusers to offload most of the decryption overhead to an edge node and verify the correctness of the received partially decrypted data from the edge node. Moreover, CUPS provides the access policy update feature with neither involving a proxyâserver, nor reâencrypting the enciphered data contents and reâdistributing the users' secret keys. The access policy update feature in CUPS does not affect the size of the message received by the endâuser, which reduces the bandwidth and the storage usage. Our comprehensive theoretical analysis proves that CUPS outperforms existing schemes in terms of functionality, communication and computation overheads
Fog based Secure Framework for Personal Health Records Systems
The rapid development of personal health records (PHR) systems enables an
individual to collect, create, store and share his PHR to authorized entities.
Health care systems within the smart city environment require a patient to
share his PRH data with a multitude of institutions' repositories located in
the cloud. The cloud computing paradigm cannot meet such a massive
transformative healthcare systems due to drawbacks including network latency,
scalability and bandwidth. Fog computing relieves the burden of conventional
cloud computing by availing intermediate fog nodes between the end users and
the remote servers. Aiming at a massive demand of PHR data within a ubiquitous
smart city, we propose a secure and fog assisted framework for PHR systems to
address security, access control and privacy concerns. Built under a fog-based
architecture, the proposed framework makes use of efficient key exchange
protocol coupled with ciphertext attribute based encryption (CP-ABE) to
guarantee confidentiality and fine-grained access control within the system
respectively. We also make use of digital signature combined with CP-ABE to
ensure the system authentication and users privacy. We provide the analysis of
the proposed framework in terms of security and performance.Comment: 12 pages (CMC Journal, Tech Science Press
Fog computing security and privacy issues, open challenges, and blockchain solution: An overview
Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance the low latency IoT applications and meet the distribution nature of these devices. However, Fog computing was criticized for several privacy and security vulnerabilities. This paper aims to identify and discuss the security challenges for Fog computing. It also discusses blockchain technology as a complementary mechanism associated with Fog computing to mitigate the impact of these issues. The findings of this paper reveal that blockchain can meet the privacy and security requirements of fog computing; however, there are several limitations of blockchain that should be further investigated in the context of Fog computing
TKSE: Trustworthy keyword search over encrypted data with two-side verifiability via blockchain
AXA Research Fund Singapor
- âŠ